----------------------------------------------------------------------------
本位作者:美国芝加哥大学法学博士(J.S.D., March 1997);哈佛大学法学硕士(LL.M., June 1994)。现任中央大学产业经济研究所专任助理教授。
[1] See The Starr Report: The Evidence 437-59 (Phil Kuntz ed., 1998).
[2] See generally Center for Democracy and Technology, Privacy Advocates Letter on Pentium III (Jan. 28, 1999) (http://www.cdt.org/privacy/intel.letter.html.) (visited Feb. 15, 1999).
[3] Richard M. Smith, Windows 98 Knows Who You Are, BYTE.COM (March 12, 1999)(http://www.byte.com/features/1999/03/win98priv.html)(visited March 20, 1000)
[4] Robert O’Harrow, Jr., Fearing a Plague of “Web Bugs”; Invisible Fact-Gathering Code Raises Privacy Concerns, Wash. Post, Nov. 13, 1999, at E01.
[5] See generally Jerry Kang, Information Privacy in Cyberspace Transactions, 50 Stan. L. Rev. 1193, 1246 (1998).
[6] See generally Paul M.Schwartz, Privacy and Participation: Personal Information and Public Sector Regulation in the United States, 80 Iowa L. Rev. 553 (1995).
[7] See generally William H. Minor, Identity Cards and Databases in Health Core: The Need for Federal Privacy Protection, 28 Colum. J.L. & Soc. Probs. 253 (1995).
[8] See generally James Boyle, Shamans, Software, And Spleens: Law And The Construction Of The Information Society 4-5 (1996);Dan Burk & Jennifer A. Hess, Genetic Privacy: Constitutional Considerations in Forensic DNA Testing, 5 Geo. Mason U. Civ. Rts L. J.1 (1994);Andrea de Gorgey, Comment, The Advent of DNA Databanks: Implications for Informational Privacy, 16 Am. J. L. & Med.381 (1990). See also Lawrence A. Gostin, Health Information Privacy, 80 Cornell L. Rev.451 (1995).
[9] See generally Symposium: Privacy and ITS, 11 Santa Clara Computer & High Tech. L.J. 1 (1995).
[10] See generally Lillian R. Bevier, Information About Individuals in the Hands of Government: Some Reflections on Mechanism for Privacy Protection, 3 Wm. & Marry Bill Rts. J. 455 (1995).
[11] See generally Paul M. Schwartz, Data Processing and Government Administration: The Failure of the American Legal Response to the Computer, 43 Hastings L. J. 1321(1992).
[12]Andrew L. Shapiro, Privacy for Sale: Peddling Data on the Internet, Nation, June 23, 1997.
[13] See generally Jeffrey Rothfeder: Privacy For Sale: How Computerization Has Made Everyone''s Life An Open Secret (1992).
[14] See generally Samuel Warren & Louis Barandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890).
[15] See generally Priscilla M. Regan, Legislating Privacy 26 (1995).
[16] See generally Laurence H. Tribe, American Constitutional Law Ch. 15 (2nd. Ed. 1988).
[17] See generally Davis F. Linows, Privacy in America: Is Your Life in the Public Eye (1989).
[18] Olmstead v. United States, 277 U.S. 438(1928).
[19] See, e. g., Albert W. Alshuler, Interpersonal Privacy and the Fourth Amendment, 4 N. I11. U. L. REV. 962 (1983);Robert C. Post, Rereading Warren and Brandeis: Privacy, Property and Appropriation, 41 Case Western L. Rev.647 (1991).
[20] Charles Fried, Privacy [A moral Analysis] , 77 Yale L. J. 475 (1969) , reprint in Ferdinard D. Schoeman ed., Philosophical Dimensions of Privacy (1984).
[21] Id.
[22] See generally Edward J. Bloustein, Privacy as an Aspect of Human Dignity, reprint in Schoeman, supra note 20,at 156.
[23] See generally Oscar H. Gandy, Jr., Legitimate Business Interest: No End in Sight? An Inquiry of Privacy in Cyberspace, 1996 U. Chi. Legal F. 77 (1996).
[24] See generally Edward J. Markey, A Privacy Safety Net, Mit Technology Review , Aug/Sept. 1997, at 29.
[25] Smith v. Maryland, 442 U.S. 735, 744, 745-46 (1979).
[26] See, e.g., Paul Schwartz, Privacy and Participation: Personal Information and Public Sector Regulation in the United States, 80 Iowa L. Rev. 553 (1995); Spiros Simitis, Reviewing Privacy in an Information Society, 135 U. Pa. L. Rev. 707 (1987).
|